Home | Amazing | Today | Tags | Publishers | Years | Search 
JBoss Administration and Development, Second Edition
JBoss Administration and Development, Second Edition
The primary focus of this book is the presentation of the standard JBoss 3.0.3 architecture components from both the perspective of their configuration and architecture. As a user of a standard JBoss distribution you will be given an understanding of how to configure the standard components.

As a JBoss developer, you will be given a good
...
Handbook of Multisensor Data Fusion
Handbook of Multisensor Data Fusion

Multisensor data fusion is an emerging technology with important applications in both the military and civilian sectors, such as target recognition, robotics, medical diagnostics, and "smart" buildings. It draws on techniques from wide-ranging disciplines, including artificial intelligence, pattern recognition, and statistical...

Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Microsoft .NET Kick Start
Microsoft .NET Kick Start

What is Microsoft .NET? Because this book is all about Microsoft .NET, it is important to first understand what.NET is. .NET is a technology platform for development and deployment of business applications using a set of technologies—.NET Framework, multiple programming languages, tools (particularly Visual Studio .NET),...

How to Do Everything with Microsoft Office PowerPoint 2003
How to Do Everything with Microsoft Office PowerPoint 2003

Get a quick start making your first presentation, or gain valuable insight into producing more professional presentations. How to Do Everything with Microsoft Office PowerPoint 2003 teaches essentials in a well-organized format, featuring best practices from real-world examples and plenty of practical advice from a seasoned author and...

Cisco Security Architectures
Cisco Security Architectures

Cisco Security Architectures demystifies access lists, the PIX Firewall, and how to secure a Cisco based network.

In today's age of remote users and widespread Internet access, security continues to be of utmost importance to network administrators and engineers. This important, comprehensive guide shows you how to avoid common mistakes...

Schaum's Outline of Fundamentals of Relational Databases
Schaum's Outline of Fundamentals of Relational Databases

OVER 30 MILLION SOLD

Master the fundamentals of relational databases with Schaum's­­the high-performance study guide. It will help you cut study time, hone problem-solving skills, and achieve your personal best on exams and projects!

Students love Schaum's Outlines because they produce results. Each year,...

The Common Language Infrastructure Annotated Standard
The Common Language Infrastructure Annotated Standard

The Common Language Infrastructure Annotated Standard is the definitive guide to understanding the annotated specification for the Common Language Infrastructure (CLI) standard. With annotations and code samples from both the ECMA standards committee and the Microsoft Common Language Runtime (CLR) team, this book goes...

Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Web Services Explained: Solutions and Applications for the Real World
Web Services Explained: Solutions and Applications for the Real World

Web services for decision makers: strategic insights and actionable recommendations.

  • How Web services will transform the way software is built, sold, implemented, and managed
  • All you need to know to plan an intelligent Web services strategy
  • Risks and pitfalls in current WebsServices...
Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Blog Marketing
Blog Marketing

What if you could listen to millions of people--customers, employees, competitors, partners, even the media--as they candidly discuss your company, your products, and your advertising? And what if you were able to use this real, up-to-the-minute feedback to determine exactly what your customers want and how to improve your business...

Result Page: 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy